An Improved Data Hiding Technique Using Context Aware System

Saved in:
Bibliographic Details
Published inIndian journal of science and technology Vol. 12; no. 6; pp. 1 - 8
Main Author Aborokbah, Majed
Format Journal Article
LanguageEnglish
Published 01.02.2019
Online AccessGet full text

Cover

Loading…
Author Aborokbah, Majed
Author_xml – sequence: 1
  givenname: Majed
  surname: Aborokbah
  fullname: Aborokbah, Majed
BookMark eNot0MtOwzAQBVALFYlS-g34B0LG71hiE4VHK1ViQVhbTuxAKpIUOxT6933O5s5opLs4t2jSD71H6J7AA1E8E2m7jmNKgeh0S2grU8IJZ-oKTUErngjJxeSyy4zLGzSPcQ2HYTQDBVP0mPd42W3CsPUOP9nR4kXr2v4Tl77-6tufX48_4vEuhn70_yPO_2zw-H0XR9_doevGfkc_v-QMlS_PZbFIVm-vyyJfJbVWKmGiokRRBTazXnjhLHAA6XRmNReS1g6Iqxg5PBtlBdBGVzUIXzEKjjWazZA619ZhiDH4xmxC29mwMwTMicEcGcyRwZwYzJmB7QFFblNk
Cites_doi 10.1179/1743131X14Y.0000000078
https://doi.org/10.1016/j.eswa.2009.12.072
https://doi.org/10.1109/TCE.2010.5506028
https://doi.org/10.1109/ICWS.2013.26
https://doi.org/10.4018/IJDCF.2015010102
https://doi.org/10.1049/ip-vis:20000104
https://doi.org/10.1109/LSP.2011.2114651
https://doi.org/10.1109/CISIM.2010.5643649
https://doi.org/10.1109/MDM.2011.17
https://doi.org/10.1109/CICN.2012.52
https://doi.org/10.1049/iet-ipr.2007.0220
https://doi.org/10.1109/CyberC.2012.79
https://doi.org/10.1049/iet-ipr.2009.0226
https://doi.org/10.1145/2444776.2444791
ContentType Journal Article
CorporateAuthor Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudi Arabia
CorporateAuthor_xml – name: Faculty of Computers and Information Technology, University of Tabuk, Tabuk City, Saudi Arabia
DBID AAYXX
CITATION
DOI 10.17485/ijst/2019/v12i6/141437
DatabaseName CrossRef
DatabaseTitle CrossRef
DeliveryMethod fulltext_linktorsrc
Discipline Sciences (General)
EISSN 0974-5645
EndPage 8
ExternalDocumentID 10_17485_ijst_2019_v12i6_141437
GroupedDBID 29I
2WC
8R4
8R5
AAYXX
ALMA_UNASSIGNED_HOLDINGS
CITATION
FRP
GX1
OK1
OVT
Q2X
RNS
TR2
ID FETCH-LOGICAL-c977-35b217270a8ae5e5da04006d98a94562cd01db31ae5f7a502f9bc05eb320d3f93
ISSN 0974-6846
IngestDate Tue Jul 01 03:00:00 EDT 2025
IsDoiOpenAccess false
IsOpenAccess true
IsPeerReviewed false
IsScholarly true
Issue 6
Language English
LinkModel OpenURL
MergedId FETCHMERGED-LOGICAL-c977-35b217270a8ae5e5da04006d98a94562cd01db31ae5f7a502f9bc05eb320d3f93
OpenAccessLink https://sciresol.s3.us-east-2.amazonaws.com/IJST/Articles/2019/Issue-6/Article7.pdf
PageCount 8
ParticipantIDs crossref_primary_10_17485_ijst_2019_v12i6_141437
ProviderPackageCode CITATION
AAYXX
PublicationCentury 2000
PublicationDate 2019-02-01
PublicationDateYYYYMMDD 2019-02-01
PublicationDate_xml – month: 02
  year: 2019
  text: 2019-02-01
  day: 01
PublicationDecade 2010
PublicationTitle Indian journal of science and technology
PublicationYear 2019
References Thyagaraju GS, Umakant P Kulkarni. (ref1) 2012; 40
Tsai P. (ref9) 2009; 3
Chakraborty S and Raghavan KR, Johnson MP, Srivastava MB. (ref17) 2013
Ukil A. (ref18)
Narmatha C, Manimegalai P and Manimurugan S. (ref6) 2017; (3)
Fallahpour M, Megias D, Ghanbari M. (ref12) 2011; 5
Aniket Pingley George, Wei Yu, Nan Zhang George, Xinwen Fu and Wei Zhao. (ref16) 2012; 56
Xinpeng Zhang. (ref11) 2011; 18
Manimurugan S and Narmatha C. (ref4) 2015; 7
Yu Chen Hu. (ref8) 2003; 3
Pandit AA and Kumar A. (ref21) 2012
Amit Phadikar, Santi P Maity. (ref10) 2010; 56
Kapitsaki GM. (ref15) 2013
Riboni D, Pareschi L and Bettini C. (ref20) 2011
Narmatha C, Manimegalai P and Manimurugan S. (ref3) 2018; 7
Almutairi S, Aldabbas H and Abu-Samaha A. (ref13) 2012; 4
Gaud N, Deen A, Silakari S. (ref14) 2012
Lee Y, Kwon O. (ref19) 2010; 37
Manimurugan S, Porkumaran K, Narmatha C. (ref5) 2014; 62
Wu DC and Tsai WH. (ref7) 2000; 147
Narmatha C, Manimegalai P and Manimurugan S. (ref2) 2018; 13
References_xml – volume: 62
  start-page: 403
  issue: (8)
  year: 2014
  ident: ref5
  article-title: The New Block Pixel Sort Algorithm for TVC Encrypted Medical Image.
  publication-title: Imaging Science Journal.
  doi: 10.1179/1743131X14Y.0000000078
– volume: (3)
  start-page: 96
  year: 2017
  ident: ref6
  article-title: The Secure Lossless Compression Scheme for Grayscale Medical Images Using PBT and Modified Steganography.
  publication-title: Journal of Advanced Research in Dynamical and Control Systems. Recent Trends in Engineering and Managerial Excellence.
– volume: 37
  start-page: 5192
  year: 2010
  ident: ref19
  article-title: An index-based privacy preserving service trigger in context-aware computing environments.
  publication-title: School of International Management, Kyunghee University, Seochun, Ghiheung, Yongin, Kyunggi-do, South Korea. Expert Systems with Applications.
  doi: https://doi.org/10.1016/j.eswa.2009.12.072
– volume: 56
  issue: (2)
  year: 2010
  ident: ref10
  article-title: ROI Based Error Concealment of Compressed Object Based Image using QIM Data Hiding and Wavelet Transform.
  publication-title: IEEE Transactions on Consumer Electronics.
  doi: https://doi.org/10.1109/TCE.2010.5506028
– volume: 13
  start-page: 1
  year: 2018
  ident: ref2
  article-title: A Grayscale Image Hiding Encode Scheme for Secure Transmission.
  publication-title: Current Signal Transduction Therapy.
– volume: 7
  start-page: 110
  issue: (3-6)
  year: 2018
  ident: ref3
  article-title: A Decode Technique of MSI for Efficient Reconstruction Process.
  publication-title: International Journal of Engineering & Technology.
– year: 2013
  ident: ref15
  article-title: Reflecting user privacy preferences in context-aware Web Services. Department of Computer Science University of Cyprus Nicosia, Cyprus.
  publication-title: Proceedings of the IEEE 20th International Conference on Web Services.
  doi: https://doi.org/10.1109/ICWS.2013.26
– volume: 7
  start-page: 26
  issue: (1)
  year: 2015
  ident: ref4
  article-title: Secure and Efficient Medical Image Transmission by New Tailored Visual Cryptography Scheme with LS Compressions.
  publication-title: International Journal of Digital Crime and Forensics (IJDCF)
  doi: https://doi.org/10.4018/IJDCF.2015010102
– volume: 147
  issue: (1)
  year: 2000
  ident: ref7
  article-title: Spatial-domain image hiding using image differencing.
  publication-title: IEE Proceedings - Vision, Image and Signal Processing.
  doi: https://doi.org/10.1049/ip-vis:20000104
– volume: 18
  start-page: 255
  issue: (4)
  year: 2011
  ident: ref11
  article-title: Reversible Data Hiding in Encrypted Image.
  publication-title: IEEE Signal Processing Letters.
  doi: https://doi.org/10.1109/LSP.2011.2114651
– ident: ref18
  article-title: Context Protecting Privacy Preservation in Ubiquitous Computing. Innovation Labs, Tata Consultancy Services, Kolkata, India.
  publication-title: Proceedings of the IEEE CISIM 2010, Krakow, Poland.
  doi: https://doi.org/10.1109/CISIM.2010.5643649
– volume: 40
  start-page: 47
  issue: (3)
  year: 2012
  ident: ref1
  article-title: Design and Implementation of User Context aware Recommendation Engine for Mobile using Bayesian Network, Fuzzy Logic and Rule Base.
  publication-title: International Journal of Computer Applications.
– volume: 56
  start-page: 2551
  issue: (11)
  year: 2012
  ident: ref16
  article-title: A context-aware scheme for privacy-preserving location-based services.
  publication-title: The International Journal of Computer and Telecommunications Networking Archive.
– start-page: 1
  year: 2011
  ident: ref20
  article-title: Integrating Identity, Location, and Absence Privacy in Context-aware Retrieval of Points of Interest. University, degli Studi di Milano, D.I. Co., EveryWare Lab.
  publication-title: 12th IEEE International Conference.
  doi: https://doi.org/10.1109/MDM.2011.17
– volume: 4
  issue: (3)
  year: 2012
  ident: ref13
  article-title: Review on the security related issues in context aware system. De Montfort University, software technology research laboratory (STRL) Leicester, United Kingdom.
  publication-title: Proceedings of the International Journal of Wireless & Mobile Networks (IJWMN).
– year: 2012
  ident: ref14
  article-title: Architecture for discovery of context-aware web services based on privacy preferences. Computer Science & Engineering, U.I.T, R.G.P.V. Bhopal, Madhya Pradesh, India.
  publication-title: Proceedings of the Fourth International Conference on Computational Intelligence and Communication Networks.
  doi: https://doi.org/10.1109/CICN.2012.52
– volume: 3
  start-page: 100
  issue: (2)
  year: 2009
  ident: ref9
  article-title: Histogram-based reversible data hiding for vector quantisation-compressed images.
  publication-title: IET Image Process.
  doi: https://doi.org/10.1049/iet-ipr.2007.0220
– start-page: 435
  year: 2012
  ident: ref21
  article-title: Conceptual Framework and a Critical Review for Privacy Preservation in Context Aware Systems.
  publication-title: Proceedings of the International Conference on Cyber-Enabled Distributed Computing and Knowledge Discover IEEE.
  doi: https://doi.org/10.1109/CyberC.2012.79
– volume: 5
  start-page: 190
  issue: (2)
  year: 2011
  ident: ref12
  article-title: Reversible and high-capacity data hiding in medical images.
  publication-title: IET Image Process.
  doi: https://doi.org/10.1049/iet-ipr.2009.0226
– start-page: 26
  year: 2013
  ident: ref17
  article-title: A Framework for Context-Aware Privacy of Sensor Data on Mobile Systems.
  publication-title: University of California, Los Angeles. ACM HotMobile'13,
  doi: https://doi.org/10.1145/2444776.2444791
– volume: 3
  start-page: 202
  issue: (2)
  year: 2003
  ident: ref8
  article-title: Grey-level image hiding scheme based on vector quantization.
  publication-title: Electronics Letters.
SSID ssj0000328070
Score 2.1197293
SourceID crossref
SourceType Index Database
StartPage 1
Title An Improved Data Hiding Technique Using Context Aware System
Volume 12
hasFullText 1
inHoldings 1
isFullTextHit
isPrint
link http://utb.summon.serialssolutions.com/2.0.0/link/0/eLvHCXMwnV1LSwMxEA5aL17E-sA3OXhQytrsM1vwUtRSBT210NuSbLJYha3oquCvdyabblctaL1sS0o_2s50MjM73xdCjjHExUJ2HKFY7ARu6jsidLUjM9jMVcx1ZESSbu-i_jC4GYWj2WGchl1SyLP0Yy6v5D9WhTWwK7JkF7BsBQoL8BzsC1ewMFz_ZGPs6JmmAGSNl6IQrf7YcFQGlTDr0N7Xz3HAo9V9xzmvUqS8npVe50agoKYiMWX7mPnKH913PE9r8ijFfcn2ebAEKds8QL5SNYhhu4A8cKLYdgH1bA1FZr4ESa_mDPWI59a3zrkxmQcx6leMH5DE0sNPAQ9vrjc2XYMAEjY-24ymN-C_7VHV5CDWLAiYIFyCYImBSkqgZbLiQb1gWN8jt2q2oWggMwcHVl_YzvohVhux2ojVNljtEquWqdRSjsE6WbO1Au2Whm-SJZ1vkKaNxi_0xEqGn26S825Op55A0RNo6Qm08gRqPIFaT6DGE2jpCVtk0LsaXPQdey6Gk0K27vihxFPFOBOx0KEOlcBAHCn4z3Wwnk0Vc5X0XXgx4yJkXtaRKQu19D2m_Kzjb5NGPsn1DqGZFBqSOCgbMxn4qZIs416seco9GfCM7RI2_QmSp1L9JPnFAnuLv2WfrM5884A0iudXfQipXiGPjBk_Ad0ZTwQ
linkProvider Geneva Foundation for Medical Education and Research
openUrl ctx_ver=Z39.88-2004&ctx_enc=info%3Aofi%2Fenc%3AUTF-8&rfr_id=info%3Asid%2Fsummon.serialssolutions.com&rft_val_fmt=info%3Aofi%2Ffmt%3Akev%3Amtx%3Ajournal&rft.genre=article&rft.atitle=An+Improved+Data+Hiding+Technique+Using+Context+Aware+System&rft.jtitle=Indian+journal+of+science+and+technology&rft.au=Aborokbah%2C+Majed&rft.date=2019-02-01&rft.issn=0974-6846&rft.eissn=0974-5645&rft.volume=12&rft.issue=6&rft.spage=1&rft.epage=8&rft_id=info:doi/10.17485%2Fijst%2F2019%2Fv12i6%2F141437&rft.externalDBID=n%2Fa&rft.externalDocID=10_17485_ijst_2019_v12i6_141437
thumbnail_l http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/lc.gif&issn=0974-6846&client=summon
thumbnail_m http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/mc.gif&issn=0974-6846&client=summon
thumbnail_s http://covers-cdn.summon.serialssolutions.com/index.aspx?isbn=/sc.gif&issn=0974-6846&client=summon